All resources sponsored by:

Veracode, Inc.

1 - 25 of 48 Matches
The Processes of an Application Security Program
sponsored by Veracode, Inc.
WEBCAST:In this video, you can view a demo of how one application security program works.
Posted: 20 Mar 2015 | Premiered: Mar 4, 2014
Get This Now


Case Study: Global 500 Company Integrates Security and Application Development
sponsored by Veracode, Inc.
WHITE PAPER:A global 500 company faced the challenge of balancing fast application development with security. This case study describes how they met that challenge.
Posted: 20 Mar 2015 | Published: 01 Jan 2015
Get This Now


Global Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
WHITE PAPER:A global 100 manufacturer faced the problem of securing an increasing number of applications. How they solved this problem can provide insights for other large enterprises seeking to do the same.
Posted: 19 Mar 2015 | Published: 19 Mar 2015
Get This Now


The Secure Third Party App Buyer's Guide
sponsored by Veracode, Inc.
WEBCAST:In this webcast, gain insider tips to mitigating risk when purchasing software from vendors. Watch now to learn the key considerations for buying and how to protect your data to avoid cyberattacks.
Posted: 02 Mar 2015 | Premiered: Aug 4, 2014
Get This Now


The 3 Third Party Software Security Controls
sponsored by Veracode, Inc.
WHITE PAPER:In this informative white paper, you will uncover the three control types to improve information protection when using third party services and products. Read on to learn how these recommended approaches increase risk management practices effectiveness and enable remediation post-production avoidance.
Posted: 02 Mar 2015 | Published: 04 Dec 2014
Get This Now


Case Study: App Code Security from the Ground Up
sponsored by Veracode, Inc.
WEBCAST:View this webcast and explore how one major airline secured 300 third-party aps by building security from the code up. Discover the steps they took to close security gaps in the code and how to apply the strategies to your apps.
Posted: 02 Mar 2015 | Premiered: Jul 7, 2014
Get This Now


Strategies to Ensure Software Security
sponsored by Veracode, Inc.
WEBCAST:In this webcast, you will learn the strategies to ensuring software security and reliability and how to choose a platform that won't fail down the line. Watch now to gain insider tips and guidance.
Posted: 27 Feb 2015 | Premiered: Nov 7, 2014
Get This Now


Secure Agile Development: Why Can't We All Get Along?
sponsored by Veracode, Inc.
WEBCAST:View this webcast to learn how to weave security into development operations to bridge the gap between the two teams. Watch now to learn how to move from a waterfall to an agile strategy when developing and securing code.
Posted: 27 Feb 2015 | Premiered: Nov 19, 2014
Get This Now


Driving a Culture of Security Through Product Development and Delivery
sponsored by Veracode, Inc.
VIDEO:Tune into this webcast to learn about what it takes to successfully facilitate a secure application development and delivery strategy. Additionally, learn about some of the biggest barriers that prevent organizations from developing their own secure environments and much more.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015
Get This Now


Simplifying Security in the Agile SDLC
sponsored by Veracode, Inc.
VIDEO:How do sophisticated software development shops inject secure development into their Agile software development lifecycle? Tune into this webcasts featuring experts Maria Loughlin and Rob Curtis from application security firm Veracode, to find out.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015
Get This Now


Building Security into the Agile SDLC
sponsored by Veracode, Inc.
VIDEO:Tune into this webcasts to hear from Paul Roberts of the Security Ledger engage and Veracode's security and development experts Ryan O'Boyle and Pete Chestna as they share their best practices on integrating security into agile development- to rapidly deliver applications without exposing them to critical vulnerabilities.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015
Get This Now


Reality Checking your Security Testing Program
sponsored by Veracode, Inc.
VIDEO:How do you know if your security testing protocols are actually fully effective? This webcast demonstrates what you need to know to ensure that your security testing methods are running as they should.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015
Get This Now


Insider Strategies for Application Layer Security
sponsored by Veracode, Inc.
WEBCAST:Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.
Posted: 27 Feb 2015 | Premiered: Feb 25, 2015
Get This Now


Evolve To Become the 2018 CISO or Face Extinction
sponsored by Veracode, Inc.
WHITE PAPER:Unfortunately for the CISO, their career path is dissolving and is projected to dissipate by 2018. Luckily, this has also opened up 2 new roads to travel down: evolve into a more business-focused S&R leader or stay focused on IT. What should you do? Access this white paper to learn what Forrester Research has to say about the shift.
Posted: 27 Feb 2015 | Published: 27 Feb 2015
Get This Now

TOPICS:  Careers | CISOs

Top 5 Web and Mobile App Security Challenges
sponsored by Veracode, Inc.
RESOURCE:Access this brief infographic to learn the top five challenges to securing web and mobile applications today. View now to explore an alternative strategy to reduce app-layer risk.
Posted: 26 Feb 2015 | Published: 27 Jan 2015
Get This Now


The Application Testing Gap
sponsored by Veracode, Inc.
RESOURCE:Check out this quick infographic to see the rising cost of application security testing. Explore new ways to reduce spending while protecting all of your apps.
Posted: 26 Feb 2015 | Published: 25 Nov 2014
Get This Now


Case Study: Securing 1000+ Apps from a Centralized Dashboard
sponsored by Veracode, Inc.
CASE STUDY:Access this case study to learn how one banking firm centralized their strategy and automated testing to ensure consistency and reduce costs with a cloud-based security platform.
Posted: 26 Feb 2015 | Published: 04 Dec 2014
Get This Now


Secure Agile Development
sponsored by Veracode, Inc.
WHITE PAPER:Access this white paper to learn how to integrate security into the development process.
Posted: 26 Feb 2015 | Published: 03 Nov 2014
Get This Now


Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER:View this white paper to learn how to close application vulnerability gaps and mitigate business risk.  Read on to learn more.
Posted: 26 Feb 2015 | Published: 15 Oct 2014
Get This Now


Evolve to Become the 2018 CISO... Or risk Extinction
sponsored by Veracode, Inc.
WEBCAST:The traditional role of the CISO boasts key characteristics of having technological and security insights, but based on extensive studies from Forrester Research, it has become apparent that these are not the same characteristics you can expect to see from CISOs within the next four years. Find out why by tuning into the following webinar.
Posted: 26 Feb 2015 | Premiered: Feb 26, 2015
Get This Now


App Security: Going Beyond Scanning and Remediation
sponsored by Veracode, Inc.
WHITE PAPER:This white paper outlines one cloud-based app security platform that continuously monitors and assesses business-critical applications to find vulnerabilities earlier.
Posted: 24 Feb 2015 | Published: 09 Jul 2014
Get This Now


The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER:64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014
Get This Now


Webinar: Why Benchmark Application Security?
sponsored by Veracode, Inc.
TRANSCRIPT:Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
Posted: 19 Aug 2014 | Published: 19 Aug 2014
Get This Now


Webinar: When is Application Security Done?
sponsored by Veracode, Inc.
TRANSCRIPT:Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.
Posted: 19 Aug 2014 | Published: 19 Aug 2014
Get This Now


ROI Case Study: Cloud-Application Security Service
sponsored by Veracode, Inc.
CASE STUDY:A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
Posted: 19 Aug 2014 | Published: 19 Aug 2014
Get This Now


1 - 25 of 48 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement